Most commonly this is done via mIRC (internet Relay Chat) where bot nets are controlled. For example, where the clients communicate w/ the zombie (infected computers). Typically lazy hackers will just run an IRC bot spamming some stupid message that will infect the mIRC chat script the user is running who is tricked into clicking a link etc. You don't recruit a Zombie, you maliciously infect someones computer w/o their consent and this is illegal.
It all boils down to the fact that you need to get a Trojan on their PC to connect the PC to one of your clients in order to send commands and have a two way connection to the victims computer.
DDoS
distributed denial-of-service attack or known as DDoS
Unless you're the hacker in control of the zombie, there is no advantage. Disadvantages include: * Losing partial or complete control of your computer. * Contributing to spam, DDoS attacks, and any number of computer related crimes. * Being blamed for the above actions.
No you can't, you just do not have enough resources for that. It does not matter how much infected computers you have, the number of computers in internet is more. And because for DDoS requirements (many computers sending requests to one particular adddress) you have to have all internet infected, nobody can do that.
A DDoS attack
zombie
DDoS
Botnet
yes hehehe<3
Zombie computers are any system attached to a network that silently (unannounced to the user) perform tasks on the network to reach a predetermined goal. A computer system can become a zombie computer by being infected via a network transferable source such as via email, or via a local source delivered from a flash drive or other external source. It is most common for each zombie computer to be performing a small portion of the larger goal, and be part of a larger group of zombie computers that are all working together for the same purpose. This way, if one zombie computer is brought offline, the goal can still be reached. It also ensures that each infected system is not diverting a great deal of resources to the zombie process, which helps to ensure the zombie node is not detected and repaired. Network consequences are dependent on what the task is that the zombie collective is working on, and how many zombie nodes are contributing vs the scale of the network they sit on. For example, if 10 systems on a network of 10,000 systems are infected, the likelihood of the network being bogged down by the zombie traffic is minimal. However, it also depends on whether the goal the zombie collective is trying to achieve is targeting the local network they are on, or something outside the network on the internet, as 10 computers working to overload a local server, may achieve some results, while 10 computers trying to overload Google for instance would have little effect.
How do I cancel my membership
Buy a botnet.